Reflected Cross-Site Scripting in Order Delivery Date Plugin by WordPress
CVE-2025-2929

7.1HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
20 May 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-2929?

A vulnerability exists in versions of the Order Delivery Date WordPress plugin prior to 12.4.0, which fails to properly sanitize and escape parameters before rendering them in the web page. This oversight can lead to reflected Cross-Site Scripting (XSS) attacks targeting users, especially those with elevated privileges such as administrators. Attackers could exploit this flaw to execute arbitrary scripts in the context of the affected user's session, posing a significant security risk.

Affected Version(s)

Order Delivery Date 2.0 < 12.4.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erwan LR (WPScan)
WPScan
.
CVE-2025-2929 : Reflected Cross-Site Scripting in Order Delivery Date Plugin by WordPress